Vulnerability modelling of crypto-chips against scan-based attacks.
Mohammad TaherifardAhmad PatooghyMahdi FazeliPublished in: IET Inf. Secur. (2018)
Keyphrases
- security protocols
- denial of service
- buffer overflow
- dos attacks
- security vulnerabilities
- advanced encryption standard
- security risks
- high speed
- integrated circuit
- countermeasures
- security mechanisms
- malicious attacks
- high density
- network security
- watermarking scheme
- risk assessment
- scan data
- malicious users
- attack graphs
- attack detection
- computer systems